Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs

Size: px
Start display at page:

Download "Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs"

Transcription

1 Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, Abstract This paper presents an in-depth study of applying the bridging technology with layer-3 forwarding (L3F) in Wireless Local Area Networks (WLAN). It is a unique feature in Windows XP, and supports the Internet sharing of multiple workstations with a single wireless interface. We perform detailed analysis of the protocol and discuss why L3F works over WLAN while the traditional layer-2 forwarding (L2F) does not work in this configuration. We also present the advantages of L3F over IP routing on WLAN. This paper also includes a thorough performance analysis using a high capability traffic generator and analyzer. Our results, as measured by throughput and latency, show that the L3F performance is comparable to L2F and significantly better than IP routing. 1 Introduction Computer networking for home and Small Office and Home Office (SOHO) environment is a fast growing area where people usually have several computers at different places. The primary needs are to share the Internet connection and computing resources (such as printers, FAX, and storage devices) as illustrated in Fig. 1. In general, these computers are on multiple LAN segments 1 but on a single IP subnet. Note that the Wireless Access Point (WAP) in Fig. 1 is also an IP router and multi-port Ethernet switch. This device is commonly used at home and SOHO networks. Fig. 1 SOHO network topology Fig. 2 SOHO network topology using bridge. 1 A LAN segment is loosely defined as the group of computers connected to a single port of network device. The network device could be a switch or a router.

2 Traditionally, Ethernet switch/bridge is used to connect separate LAN segments into one IP subnet as illustrated in Fig. 2 [1]. One can also use an IP router for the connection and it creates multiple IP subnets. This configuration requires more complex routing design and more costly routing devices. A major issue with this wired configuration is the need of cabling inside the wall and requires a licensed professional to do the work. The solution to the cabling problem is to apply wireless network technology [2] as illustrated in Fig.3. Fig. 3 SOHO wireless network topology. Fig. 4 SOHO Windows XP network topology. One concern with this wireless configuration is the need of a wireless adapter for each workstation. Another issue is performance where all wireless workstations are competing for the shared Radio Frequency (RF) channel which could degrade the performance [3]. The third issue is workstation configuration where changes made to the WAP (such as the WEP security key) may require manual reconfiguration on every wireless workstation. The objective of this study is to identify a cost-effective solution that supports the connection of multiple LAN segments over a single IP subnet on WLAN. We identified a unique bridge feature in Windows XP, called layer-3 forwarding (L3F). It supports the seamless connection between the wired and wireless networks as illustrated in Fig. 4, and its forwarding function is similar to the traditional Layer 2 forwarding (L2F) function as specified in IEEE [4] and 802.1D [6]. As the name implies, L3F is based on the IP address, and not on the Medium Access Control (MAC) address. Unlike IP routing, LAN segments of L3F are on a single IP subnet which makes the configuration easier and performance better. Also shown in Fig. 4 is the need of only one wireless adapter. In this paper, we present why L2F is not working in this wireless configuration and the advantages of L3F over IP routing from the perspective of network performance and management in the SOHO environment. 2 Configurations of L2F, L3F, and ICS on Windows XP The addressing scheme of [7] is more complex than that of where it requires four address fields in the frame as described in Table 1. One should note that a typical wireless adapter supports only the first three modes, and WAP supports the 2 nd and 3 rd modes. Devices that supports the 4 th mode are called wireless repeater and they are a lot more expensive than WAP.

3 Table Address scheme [5] Mode/Case Address 1 Address 2 Address 3 Address 4 WS=> WS (00) DA SA BSSID N/A WAP=>WS (10) DA Sending WAP SA N/A WS=>WAP (01) Receiving WAP SA DA N/A WAP=>WAP (11) Receiving WAP Sending WAP DA SA WS: Wireless Station BSSID: Basic Service Set ID DA: Destination Address SA: Source Address WAP: Wireless Access Point 2.1 Bridge with layer 2 forwarding (L2F) Layer 2 forwarding (L2F) is the default operation mode of Windows XP bridge and it conforms to the IEEE and 802.1D standards. Fig.5 Windows XP L2F bridge address schemes. Although L2F works well in the wired network, it does not work in the wireless network. If we configure L2F on Windows XP (Station A) as illustrated in Fig.5, we cannot send traffic from WS1 to WS2 or from WS2 to WS1 through the wireless connection. This is due to the implementation on most wireless adapters which do not support Case 11 in Table 1. When WS2 tries to communicate with WS1 through L2F via Station-A, the addressing schemes between Station A and AP need to be Case 11 (Table 1 and Fig.5-A); however, Case 11 addressing scheme exists on wireless repeater only and is not supported on wireless adapter. Therefore, when WS2 sends packets to WS1, it uses Case 10 addressing schemes (Fig.5-B), and the source address (MAC-2) is lost during the wireless communication. In the same way, when WS1 tries to communication with WS2, it should adopt Case 11 (Fig.5-C) addressing scheme. Since wireless adapter does not support Case 11 addressing mechanism, AP sends out MAC frame to wireless station A using Case 01(Fig.5-D) addressing scheme, and the destination address of WS2 (MAC-2) is lost during the wireless communication. In summary, the communication between WS1 and WS2 fails under the L2F configuration illustrated in Fig.5.

4 2.2 Bridge with layer 3 forwarding (L3F) Windows XP can also be configured as a bridge using Layer 3 forwarding (L3F) which performs the forwarding function based on the IP address. This feature supports wirelessly connection between two separate LAN segments as illustrated in Fig. 6. In this case, the Windows XP bridge functions like an ARP proxy, answering ARP requests from nodes on one LAN segment on behalf of nodes on another segment [8]. The implementation of L3F requires a forwarding table (Fig 6) based on the IP addresses. When WS1 sends data to Station A or WS2, it first tries to find their MAC addresses. If it cannot find the MAC address for /24 or /24, it broadcasts ARP requests to other nodes on the same subnet ( /24) with or as target IP address. After Windows XP bridge (Station A) receives this ARP request on its port 1, it checks its L3 forwarding table. If there is no entry for WS1 in its L3F table, it creates one entry with attributes of , port 1 and MAC-1 in the table. Then, it checks the target IP address of the received ARP request. If the target IP address belongs to itself; it simply sends back an ARP reply to WS1 with MAC-A1 as the target MAC address and as target IP address. If the target IP address does not belong to itself, it checks the L3F table. If the target IP address (WS2) is in the L3F table, it sends back an ARP reply to WS1 with MAC-A1 as the target MAC address and as the target IP address. If it does not have one entry for the target IP address, it sends its own ARP request messages out on all ports except the port on which the original ARP request is received [8]. When an ARP reply is received, it creates a new entry for WS2 in its forwarding table, and sends ARP reply to WS1 with MAC-A1 as the target MAC address and as target IP address. Similar procedure is used when WS2 initiates communication with WS1. In the example of Fig. 6, there are two entries in its L3F table, one for WS1 and the other for WS2. The procedure to build L3F table shows that Windows XP bridge knows both WS1 and WS2. For example, it knows that WS1 is on its interface of port 1; WS1 has one IP address of and an MAC address of MAC-1. However, WS1 does not know WS2 and WS2 does not know WS1 as confirmed in the ARP tables of WS1 and WS2 (Table 2 and Table 3). Thus, Windows XP bridge with L3F forms one broadcast domain on both of its bridge interfaces. Fig. 6 Windows XP L3F bridge for LAN segments connection.

5 With the L3F table, Windows XP bridge forwards packets between LAN1 and LAN2 (Fig.6). When WS1 communicates with WS2, it first sends the packets to MAC-A1. After station A receives packets from WS1, it checks the destination IP address ( ) of the packets, and finds it in its L3F table with the information of outgoing port (port 2) and destination MAC address (MAC-2). The XP bridge then adds new Ethernet frame header with MAC-2 as the destination address and its own MAC address (MAC-A2) as the source address. This new Ethernet frame is exported via Port-2 to WS2. Packets from WS2 to WS1 are processed and forwarded in the same manner. If the destination IP address of an incoming IP packet is to the Windows XP bridge itself, this packet is passed to the IP and upper layers for further processing. For broadcast IP packets, the XP bridge would forward them to all ports except the port on which the packet was received [8]. With L3F, both WS1 and WS2 can surf the Internet using AP as their default gateway. In summary, all computers are on a single IP subnet (Fig.6), and they can communicate with each other and share the computing and network resources. 2.3 Windows XP IP routing configuration In Fig. 7, station A is configured as an IP router (a.k.a. Internet Connection Sharing) with a wireless adapter for the outside connection with an IP address of and a wired adapter for the internal LAN connection with an IP address of In this example, ICS router uses the AP as its default gateway to the Internet and other LAN segments. Workstations on the local LAN (LAN2) use the ICS router ( ) as their default gateway to the Internet and other LAN segments. Fig. 7 Windows XP ICS host for LAN segments connection Fg.8 Routing table of AP. Our experiment shows that WS2 could surf the Internet and access any computer on LAN1 via the ICS router. However, computers on LAN1 could not access the computers on LAN2. We checked the routing table of AP router and found that there was no entry for x/24. As a result, the traffic from to was routed to the internet, and dropped somewhere. With this finding, we manually created an entry for in the routing table to route all the traffic with destination as x to the wireless interface of the ICS router (Fig. 8). After inserting the new entry in the routing table of AP, we still cannot send Internet Control

6 Message Protocol (ICMP) traffic (ICMP request and reply) from (outside) to (inside). This is due to Network Address Translation (NAT) which forwards traffic initiated from LAN2 to LAN1. However, any traffic initiated from outside hosts cannot be forwarded to internal hosts. Therefore, hosts on LAN2 can use resources on LAN1, but hosts on LAN1 cannot use resources in LAN2. In summary, this configuration does not meet the typical home or SOHO networking requirements. In conclusion, our analysis in section 2.1 shows that L2F cannot be used to support the wireless connection of the typical home and SOHO environments for local resource sharing and Internet connection. The ICS routing configuration supports the Internet sharing but does not support local resource sharing on different LAN segments. The L3F is the only configuration that supports the connection of multiple LAN segments into one subnet, where all workstations on different LAN segments can not only share the computing resources, but also use the same internet connection to the outside world. 3 Experiments The purpose of the experiments is to measure the performance of L2F, L3F, and ICS based on the network configuration discussed earlier. Our experiments used multiple Windows XP laptop stations where some of them are equipped with built-in wireless adapters and others have Personal Computer Memory Card International Association (PCMCIA) wireless adapters. The access point used for this experiment is Linksys Wireless-G Broadband Router with 4 10/100 Mbps LAN ports and one 10/100 Mbps Internet port. The traffic generator and analyzer is the IXIA 1600 chassis with dual 1G ports for traffic generation and reception. We follow the RFC-2544 for the benchmark performance testing [9, 10]. The key measurements of the experiment are throughput and latency. We generated various traffic using layer-2 only frames, IP packets, and User Datagram Protocol (UDP) segments. The results presented in this paper are based on the UDP traffic. The network configuration for performance measurements is illustrated in Fig. 9. Fig. 9 Windows XP wireless bridge/ics router configuration for performance measurement. Fig.10 Configuration to measure performance of L2F wireless bridge.

7 The IXIA chassis has two 1G ports where port 1 is used for data transmission and port 2 is used for reception (Fig. 9). Each data frame has a time stamp used to calculate latency at the receiving port. The reason we need two Catalyst 2950 switches is to convert 1000BaseT traffic to 100BaseTX traffic to the AP or Windows XP bridge/router which does not have the 1000BaseT NIC. The traffic generator, on the other hand, supports 1000BaseT only. As we have demonstrated in [9], the Catalyst switch would not cause any congestion as long as the input rate is less than the physical link which is 100M bps. Although L2F does not work in the wireless environment, we were able to create a special scenario to measure the L2F performance in a wireless environment. This is based on the broadcast nature of the standard and the sniffing capability of the IXIA traffic analyzer. Adapters of the XP bridge is configured in L2 promiscuous mode, where an adapter receives all frames on the shared medium, and not just the frames addressed to that adapter [11]. Network adapter drivers normally process only those frames containing the MAC address of the device. When the promiscuous mode is enabled, incoming frames of any destination MAC address are received and passed to all LAN ports in the same broadcast domain. With the configuration shown in Fig. 10, we connected port 1 of IXIA box with LAN1 through switch1, and connected port 2 with LAN2 through switch 2. We generated the traffic on port 1 with the MAC address of the wireless adapter in station A as the destination MAC address, and used any virtual MAC address as source address (Fig. 10-1). These packets could be sent to the XP bridge through the wireless connection (Fig.10-2). Since the wireless adapter was in the promiscuous mode, all frames received by this wireless adapter were forwarded to all the ports of switch 2 through the wired link. These frames were then captured by port 2 of the IXIA box. In this way, we were able to measure the performance (throughput and latency) of L2F over the wireless link. The configuration and measurements for L3F and ICS follow the discussion of Section II of this paper. 4 Performance results In our first experiment, we have a Windows XP station with one 100BaseTX Ethernet adapter and one b wireless adapter (Fig. 6). We then configured the XP station as a L2F bridge, L3F bridge, and ICS router. The performance data is collected for each configuration. As recommended by the RFC 2544 standard, we collected the performance data using various frame sizes. From Fig. 11, we can see that L2F and L3F have almost the same latency for each packet size. However, ICS routing has longer latency (5-10% longer) than both L2F and L3F. This confirms our understanding that IP routing involves more overhead in packet and routing processing. Fig. 12 shows that L2F and L3F configurations could yield a maximum throughput of 7.2 Mbps at different input rates (1000 fps or 10,000 fps) with a packet size of 1500 bytes, which is close to those reported in the literatures [3, 12]. As the case of latency, the throughput of L3F is better than that of ICS routing, 7.2M bps vs. 6.1M bps or 15% higher throughput. We also run an overload test for the frame size of 1500 bytes with input rate greater than the theoretical limit of b wireless adapter [3]. The result is given in Table 4.

8 Fig.11 Latency test for Windows XP Wireless bridge/ ICS router at nominal input rate of 10 fps. Fig.12 Wireless Windows XP bridge / route throughput at different frame sizes and different input rates. Table 4 Windows XP bridge/router overload test (frame size =1450 bytes) FPS XMIT L2F Bridge L3F Bridge ICS Router Rate Latency TPT Latency TPT Latency TPT (Mbps) (ms) (Mbps) (ms) (Mbps) (ms) (Mbps) , , , , , , , XMIT Rate: Transmit Rate; TPT: Throughput; FPS: Frames per second Table 4 shows that L2F and L3F configurations have similar performance. They reach the bottleneck at an input rate of 6.96 Mbps. At that point they have a throughput of 6.90 Mbps, and a latency of 4.9ms. If input rate continues increasing, network congestion occurs and latency increases by 2-3 orders of magnitude where throughput keeps unchanged. ICS routing, on the other hand, reaches bottleneck at a lower input rate of 5.8Mbps. If input rate continues increasing, the latency of ICS routing increases by 3-4 orders of magnitude. In summary, our performance study shows that L3F configuration has comparable performance to L2F configuration. The L3F performance is significantly better than that of ICS routing.

9 5 Factors affecting L3F performance In addition to the Windows XP configurations, we are interested in another two factors that affect the WLAN performance: o b vs g standards, and o 64-bits vs. 128 bits WEP encryption keys The experiments to compare the above two factors are all conducted with the L3F configuration on the Windows XP bridge. Fig.13 Influence of wireless standard on the latency of wireless L3F bridge. Fig.14 Influence of the length of WEP key on the latency of L3F wireless bridge. Fig. 13 shows that the latency data for b and g is almost the same for small packets, which is about 1 ms. When the packet size increases, the latency for g is significantly shorter (or better) than b. This is due to the fact that g has a higher data transmission rate than b [12]. The latency of 128-bit WEP key is higher than that of 64-bit WEP key (Fig. 14). At the packet size of 1500 bytes, the latency for 40 bits is 3,300µs, and the latency for 128 bits is 3,680 µs. The results show that longer key encryption and decryption involves more computation and longer delay than the shorter one. 6 Conclusions This study presents a new application of using bridging with layer-3 forwarding in a WLAN environment which could have a great potential for home and SOHO networking. We acknowledge that this configuration may not be suitable for the enterprise environment where multiple wireless repeater could meet the needs and provides a more scalable solution. For home and SOHO environment where the need is to connect a small number of workstations to share resources and the Internet connection, the L3F configuration is considered more cost-effective than a wireless repeater.

10 We performed detailed protocol analysis on the addressing schemes with ARP, L2F, and L3F. We demonstrated that this wireless configuration cannot be supported by the traditional layer-2 forwarding due to the addressing schemes implemented on most wireless adapters. We showed several issues with using the IP routing scheme to support this wireless configuration. Our performance analysis shows that there is almost no additional overhead for L3F where its performance is the same as L2F as measured by throughput, latency, and congestion threshold. On the other hand, L3F shows significant performance advantages over IP routing based on the same performance metrics. Currently, L3F is a unique feature found only on the Windows XP environment. Because of the significance of the application identified in this paper for home and SOHO environments, we propose the consideration of standardizing this Layer-3 forwarding feature. We also hope that this paper could bring more studies to explore more applications of layer-3 forwarding on different networking environments, and one of them is to use L3F to solve the problems related to bridging in multi-hop ad hoc networks of mobile hosts. References [1] Microsoft Corporation, "Network Bridge overview" url=/windowsxp/ home/using/productdoc/en/hnw_understanding_bridge.asp [2] Microsoft Corporation, "Home and Small Office Network Topologies" /prodtechnol/winxppro/plan/topology.mspx, May, [3] J. A. García-Macías, F. Rousseau, G. Berger-Sabbatel, L. Toumi, A. Duda "Quality of service and mobility for the wireless internet", First ACM Wireless Mobile Internet Workshop 01 Rome, Italy, [4] IEEE Standard, [5] B. A. Forouzan, Local area Networks, McGraw-Hill, [6] IEEE Standard, [7] IEEE Standard, [8] J. Davies, "How the Windows XP Network Bridge Works", /community/columns/cableguy/cg0102.mspx, January [9] J. T. Yu, Performance Evaluation on Linux Bridge, Telecommunications System Management Conference 2004, Louisville, Kentucky, TSM2004.pdf, April, [10] S. Bradner, J. McQuaid, Benchmarking Methodology for Network Interconnect Devices, RFC-2544, [11] Tom Sheldon, [12] Atheros Communications Inc Wireless LAN Performance

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) James T. Yu, jyu@cs.depaul.edu School of Computer Science, Telecommunications, and Information Systems DePaul

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask 1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

IxChariot Roaming Test Plan

IxChariot Roaming Test Plan IxChariot Roaming Test Plan Contents Overview 1 A Brief Introduction to WLAN Roaming 1 Principal Testing for WLAN Roaming 1 Test Objective 2 Topology 1 Setup Distributed APs Using the Same 802.11 Standard

More information

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1 Wireless Networks Lecture 4: Wireless Networking Devices Assistant Teacher Samraa Adnan Al-Asadi 1 Contents wireless LAN adapter cards wireless access Points wireless bridges wireless routers Assistant

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Operation Modes Access Point (AP) / WDS AP Client Bridge (CB) Repeater WDS Bridge Client Router AP Router Access Point An access

More information

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges. Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

Chapter 4 Advanced Settings and Features

Chapter 4 Advanced Settings and Features Chapter 4 Advanced Settings and Features This chapter describes the features you can configure or view under Advanced in the main menu of your WiFi range extender. Advanced Wireless Settings Note: The

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x. Exercise 1 Given the IP network below: Assign feasible IP addresses to the interfaces and write down a feasible routing table for routers A and B guaranteeing full connectivity x.x.x.33 x.x.x.254 net 131.175.16.0/24

More information

Wireless Bridge User Manual. Version 1.0

Wireless Bridge User Manual. Version 1.0 Wireless Bridge 520645 User Manual Version 1.0 FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should

More information

7010INT Data Communications Lecture 7 The Network Layer

7010INT Data Communications Lecture 7 The Network Layer Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

OSBRiDGE 24XL(i) Configuration Manual. Firmware 2.05b9

OSBRiDGE 24XL(i) Configuration Manual. Firmware 2.05b9 OSBRiDGE 24XL(i) Configuration Manual Firmware 2.05b9 1. Initial setup and configuration. OSBRiDGE 24XL devices are configurable via WWW interface. Each device uses following default settings: IP: 192.168.1.250

More information

CHAPTER 2 - NETWORK DEVICES

CHAPTER 2 - NETWORK DEVICES CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

Wireless-N USB Adapter User s Manual

Wireless-N USB Adapter User s Manual Wireless-N USB Adapter User s Manual Copyright 2007 EUSSO Technologies, Inc. All rights reserved. Table of Contents PREFACE... 3 WIRELESS LAN BASICS... 3 Warning... 3 INSTALLATION OVERVIEW... 4 INTRODUCTION...

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part II: Local Area Networks LAN Bridges CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Repeaters, Bridges & Routers Why Connecting

More information

LANCOM Techpaper IEEE n Indoor Performance

LANCOM Techpaper IEEE n Indoor Performance Introduction The standard IEEE 802.11n features a number of new mechanisms which significantly increase available bandwidths. The former wireless LAN standards based on 802.11a/g enable physical gross

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter descibes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. The number of nodes on a network and the length of cable used influence the quality of communication on the network. 2. Repeaters and

More information

Wireless LAN Adapter

Wireless LAN Adapter ANSEL Wireless LAN Adapter 2302-wl360r User s Guide Version 1.1 08/04/2003 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted

More information

Routing / Bridging. Lecturer: Carlos Rey-Moreno

Routing / Bridging. Lecturer: Carlos Rey-Moreno Routing / Bridging Lecturer: Carlos Rey-Moreno carlos.reymoreno@gmail.com Networking Course Honors on Computer Science University of the Western Cape 12 Feb - 2013 Routed Networks Routed access points

More information

Communication Networks

Communication Networks Communication Networks Chapter 5 Interconnection of Networks Communication Networks - 6. Interconnecting Networks 172 Overview 1. Repeater 2. Hub 4. Switch 5. Router 6. Gateway Communication Networks -

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

Networking Fundamentals Tom Brett

Networking Fundamentals Tom Brett Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct

More information

6 Chapter 6. Figure 1 Required Unique Addresses

6 Chapter 6. Figure 1 Required Unique Addresses 6 Chapter 6 6.1 Public and Private IP Addresses The stability of the Internet depends directly on the uniqueness of publicly used network addresses. In Figure 1 Required Unique Addresses, there is an issue

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

SEMESTRAL PROJECT 37MK

SEMESTRAL PROJECT 37MK SEMESTRAL PROJECT 37MK WIRELESS TOPOLOGIES Jméno : Onofre Arce Juan Pablo Introduction.- The most common devices used on WLANs (Wireless Lans) are workstations, which include both laptop and desktop models.

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Unit A - Connecting to the Network

Unit A - Connecting to the Network Unit A - Connecting to the Network 1 What is a network? The ability to connect people and equipment no matter where they are in the world. telephone computers television How does your body work as a network?

More information

Lecture 2: Basic routing, ARP, and basic IP

Lecture 2: Basic routing, ARP, and basic IP Internetworking Lecture 2: Basic routing, ARP, and basic IP Literature: Forouzan, TCP/IP Protocol Suite: Ch 6-8 Basic Routing Delivery, Forwarding, and Routing of IP packets Connection-oriented vs Connectionless

More information

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic 1 Connecting LANs Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro + 6.11.1) CSE 3213, Fall 20105 Instructor: N. Vlajic Connecting Devices 2 Why Connecting Devices in LANs? (1) LANs do not normally

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Full file at

Full file at Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics

More information

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme Mesh Network Kiran Mathews (kmathews@rhrk.uni-kl.de) Seminar: Verteilte und vernetzte Systeme February 8, 2016 Outline 1 Why Mesh Networks? Existing System imesh 2 Architectural Overview Frame Structure

More information

NETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas*

NETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas* NETWORK SIMULATION USING NCTUns Ankit Verma* Shashi Singh* Meenakshi Vyas* 1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol.

More information

Lecture 2: Internet Structure

Lecture 2: Internet Structure Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

Connecting LANs. Required reading: Garcia 6.11 (intro ) CSE 3213, Fall 2010 Instructor: N. Vlajic

Connecting LANs. Required reading: Garcia 6.11 (intro ) CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Connecting LANs Required reading: Garcia 6.11 (intro + 6.11.1) CSE 3213, Fall 2010 Instructor: N. Vlajic Connecting Devices 2 Why Connecting Devices in LANs? (1) LANs do not normally operate in isolation

More information

Homework 3 Discussion

Homework 3 Discussion Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

4.1 Introduction to Media and Devices

4.1 Introduction to Media and Devices Chapter 4 Network Hardware 4.1 Introduction to Media and Devices Many of the issues discussed in this course, such as topology, scalability, and speed, depend on hardware. Unlike many of your computer

More information

TopGlobal MB8000 VPN Solution

TopGlobal MB8000 VPN Solution TopGlobal Solution Top Global MobileBridge connects 3G and Ethernet network, as well as WiFi network. MB8000 is a product of MobileBridge serials. MB8000 provides a gateway service for its LAN (including

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Connecting to the Network

Connecting to the Network Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Home Networking. A home network generally conforms to one of the following configurations

Home Networking. A home network generally conforms to one of the following configurations Home Networking A home network generally conforms to one of the following configurations A stand-alone computer connected to the Internet. A peer-to-peer network containing two or more computers with no

More information

User s Guide. Model NO. CP500

User s Guide. Model NO. CP500 User s Guide Model NO. CP500 Table of Contents 1. Product Introduction... 3 1.1 Overview... 3 1.2 Features... 3 2. Hardware Installation... 4 2.1 Typical Application... 4 2.1.1 Point to Point... 4 2.1.2

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode 20 CHAPTER Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

Underlying Technologies -Continued-

Underlying Technologies -Continued- S465 omputer Networks Spring 2004 hapter 3 (Part B) Underlying Technologies -ontinued- Dr. J. Harrison These slides were produced from material by Behrouz Forouzan for the text TP/IP Protocol Suite (2

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015

More information

Monitoring the Network (CPE and WBS)

Monitoring the Network (CPE and WBS) Monitoring the Network (CPE and WBS) CHAPTERS 1. View the Device Information 2. View the Wireless Settings 3. View Wireless Signal Quality 4. View Radio Status 5. View the LAN Settings 6. View the WAN

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Naveen Kumar. 1 Wi-Fi Technology

Naveen Kumar. 1 Wi-Fi Technology Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Thursday, Nov 1 st Homework #4 Due Tuesday, Nov 6 th Project #2 Due 2 IPv4 addresses are usually displayed

More information

Configuring your Home Wireless Network

Configuring your Home Wireless Network Configuring your Home Wireless Network Questions How many of you have more than one computer at home? How many of you connect to the Internet using broadband (Cable or DSL) How many already have a home

More information

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub Ethernet -- Topology: Ethernet MAC: Hub Single collision domain Hub Hub Relay Collision! After a collision, stop for a random time wait for a random time, then try again. (Walrand/Varaiya slides) - computers

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

LANCOM Techpaper Routing Performance

LANCOM Techpaper Routing Performance LANCOM Techpaper Routing Performance Applications for communications and entertainment are increasingly based on IP networks. In order to ensure that the necessary bandwidth performance can be provided

More information

Basic processes in IEEE networks

Basic processes in IEEE networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information